Suggested Topics within your search.
Suggested Topics within your search.
-
2421
Can a pseudoscalar with a mass of 365 GeV in two-Higgs-doublet models explain the CMS tt¯ excess?
Published 2024-12-01Get full text
Article -
2422
Sensitivity-Aware Differential Privacy for Federated Medical Imaging
Published 2025-04-01Get full text
Article -
2423
-
2424
An innovative complex-valued encoding black-winged kite algorithm for global optimization
Published 2025-01-01“…To foster aggregate discovery intensity and advance widespread computational efficacy, an innovative complex-valued encoding BKA (CBKA) is presented to resolve the global optimization. …”
Get full text
Article -
2425
Using Natural Language Processing to Identify Symptomatic Adverse Events in Pediatric Oncology: Tutorial for Clinician Researchers
Published 2025-07-01“…Our account highlights both facilitators and barriers encountered spanning financial support, learning curves inherent with interdisciplinary collaboration, and constraints of time and personnel. …”
Get full text
Article -
2426
-
2427
Water quality prediction using LSTM with combined normalizer for efficient water management
Published 2024-01-01“…Ultimately, the model collaborates with the codec to learn the data's characteristics and generate accurate prediction results. …”
Get full text
Article -
2428
GSF-YOLOv8: A Novel Approach for Fire Detection Using Gather-Distribute Mechanism and SimAM Attention
Published 2025-01-01“…Secondly, we integrated the SimAM attention module to optimize the collaborative learning of feature map dimensions and to reduce reliance on hyperparameter tuning through precise weight allocation, thereby improving the model’s rapid response capability to fires. …”
Get full text
Article -
2429
Future on Wheels: Safeguarding Privacy in Tomorrow’s Connected Vehicles-FUTURE-SP
Published 2024-01-01Get full text
Article -
2430
Human Performance in Deepfake Detection: A Systematic Review
Published 2025-01-01“…Deepfakes refer to a wide range of computer-generated synthetic media, in which a person’s appearance or likeness is altered to resemble that of another. …”
Get full text
Article -
2431
Invariant set theory for predicting potential failure of antibiotic cycling
Published 2025-09-01Get full text
Article -
2432
-
2433
Evaluating the Impact of Staff Cybersecurity Culture on Cyber Resilience in Colleges of Education: Insights from 12 Colleges of Education in Ghana
Published 2025-04-01“…Tertiary educational institutions have become increasingly reliant on computers and network technologies for their operations in the last few decades and this comes with a significant increase in cyber threats. …”
Get full text
Article -
2434
Deforestation Regulation Open Platform (DROP): An AI-Driven Open-Source Platform for Economically Sustainable Coffee Production and European Union Deforestation Regulation (EUDR) C...
Published 2024-09-01“…The platform’s development involves collaboration with a globally renowned advisory board and employs experts in AI, computer vision, natural language processing, software development, and cybersecurity. …”
Get full text
Article -
2435
Advances in Anti-Surveying-and-Mapping Theory and Technologies for Data Infrastructure
Published 2025-02-01Get full text
Article -
2436
-
2437
IsoPuzzle: Development and Evaluation of an Ethno-Educational Serious Game
Published 2025-07-01Get full text
Article -
2438
-
2439
-
2440
Challenges in Diagnosing Dermoid Cyst in a Neurocognitive Patient
Published 2024-01-01“…This report underscores the significance of multidisciplinary collaboration in navigating the complexities of diagnosing and managing rare oral lesions in patients with neurocognitive disorders. …”
Get full text
Article